CYBER.ORG – 1.2.3 – Trojans, Backdoors, and RATs, Lesson 4.1.6 – Exploitation Frameworks & Lab – Backdoor

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack, and use the appropriate tool to assess organizational security. .

Resources:

  • See PowerPoint presentations: 1.2.3 – Trojans, Backdoors, and RATs.pptx,  4.1.6 – Exploitation Frameworks.pptx, and Lab – Backdoor.pptx

Assignment:

  1. Begin by reading the 1.2.3 – Trojans, Backdoors, and RATs.pptx and  4.1.6 – Exploitation Frameworks.pptx presentations.
  2. Read and complete the lab activity in the Lab – Backdoor.pptx document.
  3. To confirm completion the lab activity, upload a screenshot (with today’s date) of the open meterpreter session that activates on the Kali system when the trojan payload is activated in the Windows environment to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: March 28th, 2023
Teacher Pacing Due Date: March 29th, 2023